Common Information
Type Value
Value
Malware - T1587.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29)
Details Published Attributes CTI Title
Details Website 2024-11-16 1 NordVPN software updates review
Details Website 2024-11-16 3 Shop For Top-rated VPN
Details Website 2024-11-16 1 Best Price On Business VPN
Details Website 2024-11-16 1 Best South Carolina VPN Server
Details Website 2024-11-16 1 Shop For Easy-to-use VPN
Details Website 2024-11-16 1 NordVPN Black Friday deal review
Details Website 2024-11-16 1 Get Secure VPN Today
Details Website 2024-11-16 1 Get Secure VPN Today
Details Website 2024-11-16 1 Cheap Top-rated VPN Offers
Details Website 2024-11-16 1 Cheap Affordable VPN Offers
Details Website 2024-11-16 3 Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies
Details Website 2024-11-16 2 AI Models for Decompilation
Details Website 2024-11-16 7 GitHub projects targeted with malicious commits to frame researcher
Details Website 2024-11-16 6 Fake AI video generators infect Windows, macOS with infostealers
Details Website 2024-11-15 0 Malwarebytes Premium Review: A Year of Cyber Safety
Details Website 2024-11-15 0 Cybercrime as an industry: examining the organisational structure of Chinese cybercrime | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-15 0 The Houston Housing Authority Announces Data Breach Following Ransomware Attack | Console and Associates, P.C. | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 0 Understanding the GeoVision Zero-Day Exploit and Mirai Malware Botnet
Details Website 2024-11-15 1 What Country Owns Nordvpn? — Comprehensive Guide And FAQs
Details Website 2024-11-15 38 BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Details Website 2024-11-15 38 BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Details Website 2024-11-15 3 Hack The Box | Sherlock | Unit42
Details Website 2024-11-15 12 Cybersecurity News Review — Week 46
Details Website 2024-11-15 2 Phishing Emails: How to Spot Them and Stay Safe
Details Website 2024-11-15 1 Hybrid Espionage: How Russia’s Cyber Campaign in Ukraine Combines Malware and Psychological Warfare